Analysis
-
max time kernel
149s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20250129-en -
resource tags
arch:x64arch:x86image:win10v2004-20250129-enlocale:en-usos:windows10-2004-x64system -
submitted
07/02/2025, 06:12
Static task
static1
Behavioral task
behavioral1
Sample
JaffaCakes118_b3df1761ad3b759e0759516bbcfc27c5.exe
Resource
win7-20241010-en
General
-
Target
JaffaCakes118_b3df1761ad3b759e0759516bbcfc27c5.exe
-
Size
1.6MB
-
MD5
b3df1761ad3b759e0759516bbcfc27c5
-
SHA1
ba9af5d9c407c527cc568421300302be09ebfdbe
-
SHA256
a8929b3d5c5a904027ada86379a74de93eb61eaee734eee53848220c8c220b69
-
SHA512
5ee8d97cd3a977f5bfc7c59b1199e1e8025a22e260328acd124d4dbd0b820a54332ef53a248fb9fe9139902fa57a2b43f28570dcbe4c347a99815150d028c2be
-
SSDEEP
49152:jhjcapo0JfYDSGvOsUhjcapo0JfYDSGvOs:V9lfYDSYW9lfYDSY
Malware Config
Signatures
-
Darkcomet family
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-3625106387-4207083342-115176794-1000\Control Panel\International\Geo\Nation JaffaCakes118_b3df1761ad3b759e0759516bbcfc27c5.exe -
Executes dropped EXE 1 IoCs
pid Process 4344 rzFumz.exe -
Uses the VBS compiler for execution 1 TTPs
-
Suspicious use of SetThreadContext 3 IoCs
description pid Process procid_target PID 4344 set thread context of 5040 4344 rzFumz.exe 88 PID 3100 set thread context of 3564 3100 JaffaCakes118_b3df1761ad3b759e0759516bbcfc27c5.exe 89 PID 3564 set thread context of 4060 3564 vbc.exe 90 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language JaffaCakes118_b3df1761ad3b759e0759516bbcfc27c5.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rzFumz.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language iexplore.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language vbc.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeIncreaseQuotaPrivilege 4344 rzFumz.exe Token: SeSecurityPrivilege 4344 rzFumz.exe Token: SeTakeOwnershipPrivilege 4344 rzFumz.exe Token: SeLoadDriverPrivilege 4344 rzFumz.exe Token: SeSystemProfilePrivilege 4344 rzFumz.exe Token: SeSystemtimePrivilege 4344 rzFumz.exe Token: SeProfSingleProcessPrivilege 4344 rzFumz.exe Token: SeIncBasePriorityPrivilege 4344 rzFumz.exe Token: SeCreatePagefilePrivilege 4344 rzFumz.exe Token: SeBackupPrivilege 4344 rzFumz.exe Token: SeRestorePrivilege 4344 rzFumz.exe Token: SeShutdownPrivilege 4344 rzFumz.exe Token: SeDebugPrivilege 4344 rzFumz.exe Token: SeSystemEnvironmentPrivilege 4344 rzFumz.exe Token: SeChangeNotifyPrivilege 4344 rzFumz.exe Token: SeRemoteShutdownPrivilege 4344 rzFumz.exe Token: SeUndockPrivilege 4344 rzFumz.exe Token: SeManageVolumePrivilege 4344 rzFumz.exe Token: SeImpersonatePrivilege 4344 rzFumz.exe Token: SeCreateGlobalPrivilege 4344 rzFumz.exe Token: 33 4344 rzFumz.exe Token: 34 4344 rzFumz.exe Token: 35 4344 rzFumz.exe Token: 36 4344 rzFumz.exe Token: SeIncreaseQuotaPrivilege 5040 iexplore.exe Token: SeSecurityPrivilege 5040 iexplore.exe Token: SeTakeOwnershipPrivilege 5040 iexplore.exe Token: SeLoadDriverPrivilege 5040 iexplore.exe Token: SeSystemProfilePrivilege 5040 iexplore.exe Token: SeSystemtimePrivilege 5040 iexplore.exe Token: SeProfSingleProcessPrivilege 5040 iexplore.exe Token: SeIncBasePriorityPrivilege 5040 iexplore.exe Token: SeCreatePagefilePrivilege 5040 iexplore.exe Token: SeBackupPrivilege 5040 iexplore.exe Token: SeRestorePrivilege 5040 iexplore.exe Token: SeShutdownPrivilege 5040 iexplore.exe Token: SeDebugPrivilege 5040 iexplore.exe Token: SeSystemEnvironmentPrivilege 5040 iexplore.exe Token: SeChangeNotifyPrivilege 5040 iexplore.exe Token: SeRemoteShutdownPrivilege 5040 iexplore.exe Token: SeUndockPrivilege 5040 iexplore.exe Token: SeManageVolumePrivilege 5040 iexplore.exe Token: SeImpersonatePrivilege 5040 iexplore.exe Token: SeCreateGlobalPrivilege 5040 iexplore.exe Token: 33 5040 iexplore.exe Token: 34 5040 iexplore.exe Token: 35 5040 iexplore.exe Token: 36 5040 iexplore.exe Token: SeIncreaseQuotaPrivilege 3564 vbc.exe Token: SeSecurityPrivilege 3564 vbc.exe Token: SeTakeOwnershipPrivilege 3564 vbc.exe Token: SeLoadDriverPrivilege 3564 vbc.exe Token: SeSystemProfilePrivilege 3564 vbc.exe Token: SeSystemtimePrivilege 3564 vbc.exe Token: SeProfSingleProcessPrivilege 3564 vbc.exe Token: SeIncBasePriorityPrivilege 3564 vbc.exe Token: SeCreatePagefilePrivilege 3564 vbc.exe Token: SeBackupPrivilege 3564 vbc.exe Token: SeRestorePrivilege 3564 vbc.exe Token: SeShutdownPrivilege 3564 vbc.exe Token: SeDebugPrivilege 3564 vbc.exe Token: SeSystemEnvironmentPrivilege 3564 vbc.exe Token: SeChangeNotifyPrivilege 3564 vbc.exe Token: SeRemoteShutdownPrivilege 3564 vbc.exe -
Suspicious use of WriteProcessMemory 27 IoCs
description pid Process procid_target PID 3100 wrote to memory of 4344 3100 JaffaCakes118_b3df1761ad3b759e0759516bbcfc27c5.exe 87 PID 3100 wrote to memory of 4344 3100 JaffaCakes118_b3df1761ad3b759e0759516bbcfc27c5.exe 87 PID 3100 wrote to memory of 4344 3100 JaffaCakes118_b3df1761ad3b759e0759516bbcfc27c5.exe 87 PID 4344 wrote to memory of 5040 4344 rzFumz.exe 88 PID 4344 wrote to memory of 5040 4344 rzFumz.exe 88 PID 4344 wrote to memory of 5040 4344 rzFumz.exe 88 PID 4344 wrote to memory of 5040 4344 rzFumz.exe 88 PID 4344 wrote to memory of 5040 4344 rzFumz.exe 88 PID 3100 wrote to memory of 3564 3100 JaffaCakes118_b3df1761ad3b759e0759516bbcfc27c5.exe 89 PID 3100 wrote to memory of 3564 3100 JaffaCakes118_b3df1761ad3b759e0759516bbcfc27c5.exe 89 PID 3100 wrote to memory of 3564 3100 JaffaCakes118_b3df1761ad3b759e0759516bbcfc27c5.exe 89 PID 3100 wrote to memory of 3564 3100 JaffaCakes118_b3df1761ad3b759e0759516bbcfc27c5.exe 89 PID 3100 wrote to memory of 3564 3100 JaffaCakes118_b3df1761ad3b759e0759516bbcfc27c5.exe 89 PID 3100 wrote to memory of 3564 3100 JaffaCakes118_b3df1761ad3b759e0759516bbcfc27c5.exe 89 PID 3100 wrote to memory of 3564 3100 JaffaCakes118_b3df1761ad3b759e0759516bbcfc27c5.exe 89 PID 3100 wrote to memory of 3564 3100 JaffaCakes118_b3df1761ad3b759e0759516bbcfc27c5.exe 89 PID 3100 wrote to memory of 3564 3100 JaffaCakes118_b3df1761ad3b759e0759516bbcfc27c5.exe 89 PID 3100 wrote to memory of 3564 3100 JaffaCakes118_b3df1761ad3b759e0759516bbcfc27c5.exe 89 PID 3100 wrote to memory of 3564 3100 JaffaCakes118_b3df1761ad3b759e0759516bbcfc27c5.exe 89 PID 3100 wrote to memory of 3564 3100 JaffaCakes118_b3df1761ad3b759e0759516bbcfc27c5.exe 89 PID 3100 wrote to memory of 3564 3100 JaffaCakes118_b3df1761ad3b759e0759516bbcfc27c5.exe 89 PID 3100 wrote to memory of 3564 3100 JaffaCakes118_b3df1761ad3b759e0759516bbcfc27c5.exe 89 PID 3564 wrote to memory of 4060 3564 vbc.exe 90 PID 3564 wrote to memory of 4060 3564 vbc.exe 90 PID 3564 wrote to memory of 4060 3564 vbc.exe 90 PID 3564 wrote to memory of 4060 3564 vbc.exe 90 PID 3564 wrote to memory of 4060 3564 vbc.exe 90
Processes
-
C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_b3df1761ad3b759e0759516bbcfc27c5.exe"C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_b3df1761ad3b759e0759516bbcfc27c5.exe"1⤵
- Checks computer location settings
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3100 -
C:\Users\Admin\AppData\Local\Temp\rzFumz.exe"C:\Users\Admin\AppData\Local\Temp\rzFumz.exe"2⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4344 -
C:\Program Files (x86)\Internet Explorer\iexplore.exe"C:\Program Files (x86)\Internet Explorer\iexplore.exe"3⤵
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:5040
-
-
-
C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exeC:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe2⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3564 -
C:\Program Files (x86)\Internet Explorer\iexplore.exe"C:\Program Files (x86)\Internet Explorer\iexplore.exe"3⤵PID:4060
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
820KB
MD54e60c5b5b0e6de2d865a90abc56a6543
SHA1e3481866659a68e9e4821943093003ca87ed9713
SHA25678c3e8fd1b03bdbdc661f0c2312f034ffbf992d578aff817b77100af2e23f052
SHA512b86d983ee65c84b34711d9be09a1b2a5de48d61442de4c54c6f0ef3dced2abb3930cad912ce86619f9095445f583fb8d51e50ffdf28e6ddae39108c395d6b05e